ON-DEMAND WEBINAR
In this ASSP hosted webinar, security expert Jason Roup (Security Technology Manager at BASF) outlines how businesses can shift from traditional paper systems to digital security technologies, and how this transition can bolster security, streamline operations, and cut costs.
Digitization Best Practices
Assess the problem and requirement before adopting new technologies.
Efficiently use collected data and avoid over-collecting to reduce risk.
Regular technology updates are essential to prevent obsolescence and potential risks.
Dive into the importance of optimizing the use of collected data. Understand strategies for utilizing access logs to detect patterns in unauthorized access and the significance of collecting only essential data to mitigate risks in case of breaches. This proactive approach allows security professionals to tailor their defenses more precisely, enhancing overall security posture.
The pace of technological evolution presents a dual-edged sword; while new technologies offer enhanced capabilities for securing assets, they also introduce new vulnerabilities. Learn how to select and integrate new technologies in security operations, focusing on their relevance and benefits. Gain insights into balancing asset value with the cost of technological investments and maximizing existing systems before venturing into new purchases.
Explore the transition from manual processes to digital systems, highlighting the benefits of increased efficiency and accuracy. The shift from manual to digital security processes is not merely a trend but a necessary evolution to address the complexities of modern threats. Digital systems offer unparalleled advantages in terms of scalability, automation, and precision in threat detection and response. This modernization effort extends beyond technology adoption; it encompasses a cultural shift within the organization, advocating for continuous learning and adaptation.
The symbiosis between IT and security teams is critical in creating a resilient defense against increasingly sophisticated cyber threats. This partnership is founded on the mutual goal of safeguarding the organization's digital infrastructure. IT's expertise in system architecture and network management complements the security team's focus on threat intelligence and risk management. Together, they implement comprehensive security measures, such as robust firewalls, strong encryption protocols, and regular system audits.
While data collection and analysis are vital for pre-emptive security measures, it's equally crucial to be discerning about what data is collected. This approach not only maximizes the effectiveness of security strategies but also ensures that new risks aren't inadvertently introduced.
"Every professional should be looking at their collection of data as a countermeasure... Our job is to reduce risk, not create new ones"
Jason Roup, Security Technology Manager, North America, BASF
Jason Roup, CISSP
Security Technology Manager, NA
BASF
Jason Roup is a veteran in the security technology sector. His expansive career began with the U.S. Army before he moved on to pivotal roles at Pfizer, Hemlock Semiconductor, Dow Corning, and currently BASF. His vast experience across multiple sectors affords him a unique perspective on security technology.
Jeff Gladwish
Chief Revenue Officer
iLobby
Jeff Gladwish leads the go-to-market function at iLobby which includes Marketing, Sales, Customer Success, and Revenue Operations. Recently, iLobby was recognized by Deloitte as one of the fastest growing companies in Canada, asserting itself as a leader in facility management, particularly for its visitor and emergency management solutions.
How can data management enhance physical security?
What are the best practices for adopting new security technologies?
How important is the role of IT in modern security programs?